CHAPTER 4. About TMS and the SAN
|
|
- Roger Cole
- 6 years ago
- Views:
Transcription
1 CHAPTER 4 About TMS and the SAN Recently, during assistance visits to the field, it came to our attention that there is confusion between the Security Assistance Network (SAN) and the Training Management System (TMS). People have a tendency to refer to the SAN as the TMS system and vice versa. Some seem to believe that when they are using the TMS system, they are actually logged on the Security Assistance Network. So let's try to straighten things out a bit and put it in a language that can be understood by all. The Security Assistance Network (SAN) is the term that we use for the world-wide internet based system or network established for the S. A. community. Today the SAN system is used primarily by the S.A. training community. The SAN system provides the following functions: bulletin boards, libraries, internet web page links, training data repository, training data download, an on-line training data system, and it also provides accounts for all who have requested them. The Standardized Training List or STL on the SAN is simply the module that makes available the S.A. training data bases. The Training Management System or TMS is entirely separate. It is a stand alone, data base management system that operates independently on a PC in the training office. The STL data may even be downloaded on a separate computer than the one running TMS. It can simply be copied over to the TMS computer. TMS allows the training manager to identify training needed to fulfill specific training requirements. The training manager inputs all of the data on prospective students, thus establishing a historical database of country personnel trained by the U.S. The Invitational Travel Order (ITO) required by the Joint Security Assistance Training (JSAT) regulation can then be generated by merging data from all of the data bases. TMS generates reports for the training manager on his/her training program as desired. And, in the latest version of TMS, TMS 6.0, the SAO training manager can now upload data on departing students to the Security Assistance Network. SECURITY ASSISTANCE NETWORK The Security Assistance Network (SAN) consists of a telecommunications "gateway," selected options and databases stored at the gateway control point, and automated systems which can be accessed by passing through the gateway. Thus it is through the SAN that users are able to access the various international logistics and financial management systems. The Security Assistance Network, however, is used in an entirely different manner by the training community. The SAN actually plays host to the security assistance training management databases belonging to the military services. The Standardized Training List (STL) and the Military Articles and Services List (MASL) databases are available for data download to the over eighty countries that now have active users on the network. The "stand alone" Training Management System was developed for use at the overseas security assistance office (SAO) level to assist in all phases of the SAO's training management duties. Now with the addition of the international military student offices (IMSOs) at many training installations as active users on the network, the entire security assistance training community is using the SAN. Establishment of the STL and MASL databases at the SAN host and the availability of that data to all users is portrayed in Figure 1-1. The databases from the military service training agencies are transmitted to the SAN in Alexandria VA on a daily/weekly basis (SATFA & NETSAFA daily, AFSAT weekly). There, the separate Army, Navy, and Air Force portions of the S.A. training program are merged together into the Standardized Training List database that literally is the complete 4-1
2 Country training program. Likewise, the MASL data is assembled and is made available to the training managers who have need of this data. With the advent of worldwide internet access, all of our U.S. security assistance offices can now access their training program data via the SAN. FIGURE 4-1 The Worldwide SAN System TRAINING MANAGEMENT SYSTEM The Training Management System (TMS) is a data base management system that operates in a stand alone PC environment at the SAO level. The TMS system is also used by Unified Command training managers. This software provides the training manager the requisite automation that has been needed for such a long time, particularly at the SAO level. Training management data that previously was provided via hard copy only, can now be handled in a modern data base management system that was custom developed for the SAO training manager. The system generates standard reports for the Training Manager. The system then allows for the input of data specific to the individual student. All of the databases are then merged and the Invitational Travel Order is printed by the system. TMS also generates training requests and attachment messages which can be sent through normal . TMS Version 3.1, using the SAN STL data, replaced the manual system which consisted of hard copy printouts of the Standardized Training Listing mailed monthly to the SAO by the Army, Navy, and Air Force training agencies. The MASL was also provided in hard copy format and mailed semi-annually. TMS 3.1, developed in 1990 using Foxpro, was hard coded and could not be changed without using a contractor at considerable expense. Consequently, a 4-2
3 decision was made to use Microsoft Access to develop TMS 4.0 and to do it completely in house by the government. TMS versions 4.1 through 4.3 were subsequently fielded. TMS 5.O, a Microsoft Access 97 runtime program, was fielded in December 1999 and was Y2K compliant. TMS 6.0, a Microsoft Access 2000 and XP runtime program, was fielded in Spring of The latest version of TMS, TMS 6.003, was fielded in September TMS is actually a very sophisticated Microsoft Access application and, as such, offers tremendous flexibility. Additional new databases and functionality are constantly being added, such as the ability to upload data to the Security Assistance Network. TMS is also being completely reprogrammed to support the future Defense Security Assistance Management System (DSAMS) training module. THE SAN WEB SYSTEM The SAN Web system is simply a module on the SAN that provides on-line access to the SAN training databases to all training users. All training activity IMSO offices can now have access to data on their incoming student population. And, the system allows the IMSO in turn to input critical data concerning their training location, their courses, and data about the international military students at their training activity. Fielding of the SAN Web system was begun with all IMSO offices in January The IMSO Web has also been fielded with U.S. Navy, Marine Corps, and U.S. Coast Guard training activities. Fielding with the Air Force is still being accomplished. The cooperation of all service IMSO offices is earnestly sought. SAO training managers can also have access to their country training program data online via the SAO Web system. While the SAO training manager will continue to use TMS for most of their work off line, the SAO Web access provides a unique opportunity for the SAO to view current student status on-line. And, there are hyperlinks that provide access to all training managers at all levels. The most recent community to be given access to the on-line SAN Web system are our International SAN (I-SAN) users. When access has been requested by the SAO for their Country training counterparts, these international users via the parallel I-SAN system can view their country training program data on-line as well as viewing all MASL data. COMMUNICATION BY ELECTRONIC MAIL It is hard to imagine that there were those who did not think that the use of Electronic Mail would have a dramatic effect on the way we implement the S.A. training program. Training program communications that previously were handled by data fax, telephone, and military message are now accomplished via . is now routinely used between the SAO, unified command, military service training offices, and the military school houses. is much less time sensitive in that messages can be sent out when the sender needs to regardless of whether the recipient is available. When he/she comes to work and checks the an answer can be sent quickly and efficiently. Checking the on a regular basis is quite essential, however. permits a user to "attach" any file to an message and send it with the message. Thus TMS generated reports, Invitational Travel Orders, IMS biographical data, and other files can be sent as attachments. TMS will automatically attaches them to an message. Some military service training managers have expressed the fear that we cannot trust the SAO and the school houses to communicate directly via . In accordance with the Joint Security Assistance Training (JSAT) regulation, "routine" communication is permitted and already takes place via phone, fax, and normal message traffic. Again, electronic mail simply provides another means of communication, and the existing policies concerning communications apply similarly to . Actually, the system provides an easy way to send information copies to whomever the sender desires. The task at hand is that of overcoming the human inertia and 4-3
4 resistance of those who have not used in the past and are consequently unfamiliar with its utility and potential. Users of systems must identify the complete Internet addresses of all POCs with whom they routinely communicate. SAN SYSTEM REQUIREMENTS Computer equipment requirements are iterated in Table of the SAMM. All future acquisitions should meet these specifications. This is doubly important because the computer procured may well be used for more than the TMS system or SAN. It may also be used for the Security Assistance Automated Resource Management Systems (SAARMS) module. It is absolutely essential that a robust, fast computer be made available to the TMS and SAARMS users. The best computer should not reside on the SAO Chief s desk, as simply a status symbol. WHO YOU GONNA CALL? What happens when you need help? Who you gonna call? Ghost Busters? Perhaps the following will answer those questions. 1. First of all, try to solve the problem yourself, get help from someone else in your office, perhaps someone with a little more computer experience than you. 2. Are there any computer support personnel in the Embassy or in your command who can help? Try all of your local resources first. 3. Then, call your SAN system administrator for assistance. Available computer support on the unified command staffs varies. 4. In any case, if you have not received the help you need, call DISAM for assistance. That is your next step. In the Preface to this Handbook, the DISAM points of contact for assistance are listed. Please try to ask for the appropriate person. a. Identify--yourself completely, your Country, your specific training program (IMET, FMS, etc.) that you are having a problem with, and the specific WCN training line. b. Please have your facts together and written down. We cannot solve problems when we simply don't know what they are. c. Try to duplicate the problem, cause it to happen again and write down what occurred or use print screen. d. Also it is important that you know your system configuration both in terms of hardware and software. DATA INTEGRITY An awful lot of hard work has gone in to providing good quality, reliable data to the training manager. And, unfortunately, there is still work that remains. From time to time, whole sets of data, such as the STL data for a given FMS Case, is simply not there. In other words, the data simply wasn't uploaded to the SAN (the STL function) by the responsible military service. Sometimes specific data fields are left blank, either because the data wasn't entered by the responsible country manager or there is a military service system problem in that the data is not generated. Regardless of the reason, it is absolutely necessary that SATFA, NETSAFA, and AFSAT verify their data and insure that it is actually there. Performing this function is extremely important. The key word is "ownership." Look at it this way. If there was a problem with the data provided on the "old" hard copy listings, what would be done? The SAO would report the problem to the military service (the country manager), and he or she would correct the problem, perhaps even send a replacement listing. That same "ownership" applies to the military service's data that resides in the STL function (awaiting download by the SAO). It still is the military service s data and they are responsible for its quality. A lot of folks still don't recognize this problem or agree with the obvious solution. Today, the users of TMS have far more visibility of their training data. When there are problems with the data, someone is going to hear about it. With the fielding of the new IMSO Web System, IMSO offices at our training activities are 4-4
5 now busily updating the new detailed training location database. They are also verifying MASL data for training courses at their training activities and inputting recommended MASL database changes to the MILDEPs. We have never before had anyone with this ability to QA our actual MASL data and course descriptions. For the first time there is real optimism that, as a result of what our IMSO offices can now do, the overall quality of our data should dramatically improve. USE OF THE SAN BY THE TRAINING COMMUNITY The Security Assistance Network and the Training Management System have undergone extensive improvement and development to bring them to their current level. Ten years from now we will surely be using telecommunications systems of far greater capability. Never before has DSCA funded a project that was as important to the S.A. training community as the SAN, the SAN Web, and TMS are. It is certainly up to us as training managers to make these systems work for us. 4-5
CHAPTER 1. Using the Training Management System (TMS)
CHAPTER 1 Using the Training Management System (TMS) A. INSTALLING TMS Installation instructions for TMS are provided in Chapter 2 of this Handbook. B. STARTING TMS Start TMS by double-clicking on the
More informationVirtualization. Q&A with an industry leader. Virtualization is rapidly becoming a fact of life for agency executives,
Virtualization Q&A with an industry leader Virtualization is rapidly becoming a fact of life for agency executives, as the basis for data center consolidation and cloud computing and, increasingly, as
More informationDefense Health Agency Protected Health Information Management Tool (PHIMT)
Defense Health Agency Protected Health Information Management Tool (PHIMT) Training Reference: Privacy Specialist User Guide Version 3.0 March 2011 Any data herein that may be construed as personal information
More informationDefense Health Agency Protected Health Information Management Tool (PHIMT)
Defense Health Agency Protected Health Information Management Tool (PHIMT) Training Reference: Regular User Guide Version 3.0 March 2011 Any data herein that may be construed as personal information is
More informationSecurity Assistance Network (SAN) User Administration
Security Assistance Network (SAN) User Administration Note: All user group administrators can accomplish the following functions for the SAN Web registered users in their user group. Higher level user
More informationFig (1) sending and receiving s
Electronic Mail Protocols (SMTP, POP, IMAP) It is important to (1) distinguish the user interface (i.e., your mail reader) from the underlying message transfer protocols (such as SMTP, POP or IMAP), and
More informationAdding (or modifying) a Prospect Record
Adding (or modifying) a Prospect Record Prospect Biographical Details Description This script will describe how to use the Biographical Details pages within the Prospect Data component to add a new prospect
More informationDepartment of Defense INSTRUCTION
Department of Defense INSTRUCTION NUMBER 4525.8 December 26, 2001 USD(AT&L) SUBJECT: DoD Official Mail Management References: (a) DoD Directive 4525.6, "Single Manager for Military Postal Service," May
More informationThis document/guide contains dated material; always check the ASMC website for the most recent information, policies, and other information.
December 2010 CDFM OVERVIEW The American Society of Military Comptrollers offers the Certified Defense Financial Manager (CDFM) program to those persons desiring to demonstrate proficiency in the core
More informationFrequently Asked Questions about the NDIS
Frequently Asked Questions about the NDIS Contents 3 4 5 5 5 5 6 6 7 7 8 8 8 8 8 9 9 9 9 9 10 10 10 10 11 11 11 11 12 12 12 12 13 13 13 14 14 What is the NDIS and how is it different to current funding
More informationMobile Communication Devices. 1.0 Purpose. 2.0 Policy NO Virginia Polytechnic Institute and State University
Mobile Communication Devices NO. 3960 Policy Effective Date: 3/8/2016 Last Revision Date: Policy Owner: Dwight Shelton Policy Author: (Contact Person) Savita Sharma Affected Parties: Faculty Staff 1.0
More informationVeteran By-Name List
Veteran By-Name List ServicePoint Handbook CONTENTS REVISION HISTORY... 2 SURVEYING VETERANS EXPERIENCING HOMELESSNESS... 3 VETERAN BY-NAME LIST WORKFLOW... 4 1. CLIENT SEARCH/CREATE NEW RECORD... 5 2.
More informationReading Introduction to Web Accessibility
Reading 8.3 - Introduction to Web Accessibility By WebAIM.org Introduction Most people today can hardly conceive of life without the internet. Some have argued that no other single invention has been more
More informationSending LESSON PLAN UNIT 1. Essential Question How do you connect with others through ?
LESSON PLAN Sending Email UNIT 1 Essential Question How do you connect with others through email? Lesson Overview Students explore how they can use email to communicate with real people within their schools,
More informationUNIFIED VS. FEDERATED
UNIFIED VS. FEDERATED Which Has the Proven Track Record for Managing Information? In a classic case of man versus machine, the unified approach to managing information depends on human judgment and discipline,
More informationUnited states postal service tracking package
United states postal service tracking package What is a scheduled frequency? A programmed frequency is a specific day or days in which deliveries are made to difficult-to-access populations. What time
More informationShareSpace Table of Contents
ShareSpace Table of Contents Introduction to ShareSpace...2 Using ShareSpace...3 Signing In...3 Uploading...5 Downloading...6 Inviting to Upload...7 Summary...8 1 Introduction to ShareSpace When it comes
More informationSending LESSON PLAN UNIT 1. Essential Question How do you connect with others through ? Lesson Overview. Learning Objectives
LESSON PLAN Sending Email GRADES K-2 UNIT Essential Question How do you connect with others through email? Lesson Overview Students explore how they can use email to communicate with real people within
More informationInternet Exchange Points An Internet Society Public Policy Briefing
Internet Exchange Points An Internet Society Public Policy Briefing 30 October 2015 Introduction Internet exchange points are physical locations where different networks connect to exchange Internet traffic
More informationMost, but not all, state associations link to the VU web site.
1 Most, but not all, state associations link to the VU web site. The graphic above was taken from the Arizona association which is one of the biggest promoters of the VU. If you Googled virtual university
More informationSending LESSON PLAN UNIT 1. Essential Question How do you connect with others through ?
LESSON PLAN Sending Email UNIT 1 Essential Question How do you connect with others through email? Lesson Overview Students explore how they can use email to communicate with real people within their schools,
More informationSUPPORT POINT Deficiency Report Program Manager (DRPM)
SUPPORT POINT Deficiency Report Program Manager (DRPM) Product Quality Deficiency Report (PQDR) Receipt In Product Data Reporting and Evaluation Program (PDREP) User Guide July 2018 Table of Contents FOREWORD
More informationCriminals target government funded cell phone program
#### http://www.kmov.com/news/local/criminals-target-government-funded-cell-phone-progra... Page 1 of 3 Criminals target government funded cell phone program by Chris Nagus KMOV.com Posted on November
More informationRe: Filing of Windstream's Comments to Notice of Proposed Rulemaking; Case No. NNTRC
New Mexico Office of External Affairs 1660 Old Pecos Trail- Suite D Santa Fe; NM 87505 1:505.9559700 f:505.955.9699 windstream September 19, 2011 Executive Director Navajo Nation Telecommunications Regulatory
More informationOverview: Students explore how they can use to communicate with real people within their schools, families, and communities.
Sending Email LESSON PLAN Essential Question: How do you connect with others through email? Learning Overview and Objectives Overview: Students explore how they can use email to communicate with real people
More informationCHAPTER 18: CLIENT COMMUNICATION
CHAPTER 18: CLIENT COMMUNICATION Chapter outline When to communicate with clients What modes of communication to use How much to communicate How to benefit from client communication Understanding your
More informationOracle Banking Digital Experience
Oracle Banking Digital Experience FCUBS Originations Saving Account User Manual Release 18.3.0.0.0 Part No. F12056-01 December 2018 Preface FCUBS Originations Saving Account User Manual December 2018 Oracle
More informationWeb Content Management
Web Content Management With Drupal Department User Guide Version 1.1 1 Table of Contents Overview 3 Getting Started 3 Writing for the Web 4 Speak to Your Audience 4 Keep it Professional 4 Introducing:
More informationProposal: [Product Name] User Documentation
l i s a p r i c e Proposal: [Product Name] User Documentation l i s a @ w r i n k l y b r a i n. c o m w w w. w r i n k l y b r a i n. c o m Introduction As my first project for [Client] as a contractor,
More informationMail Meets. QR Code. Landing page. A Step-by-Step Guide to Coordinating Your Multi-Channel Direct Marketing MySnail ( )
Mail Meets PURL QR Code Email Mobile Landing page A Step-by-Step Guide to Coordinating Your Multi-Channel Direct Marketing www.snailworks.com 855-MySnail (697-6245) MULTI-CHANNEL DIRECT MARKETING MAIL
More informationIt Might Be Valid, But It's Still Wrong Paul Maskens and Andy Kramek
Seite 1 von 5 Issue Date: FoxTalk July 2000 It Might Be Valid, But It's Still Wrong Paul Maskens and Andy Kramek This month, Paul Maskens and Andy Kramek discuss the problems of validating data entry.
More informationElectronic Official Personnel Folder (eopf) Frequently Asked Questions for Department of the Army Employees
Electronic Official Personnel Folder (eopf) Frequently Asked Questions for Department of the Army Employees 1. What is an Official Personnel Folder (OPF)? The Official Personnel Folder (Standard Form 66)
More informationSTATE OF NORTH CAROLINA
STATE OF NORTH CAROLINA AUDIT OF THE INFORMATION SYSTEMS GENERAL CONTROLS ELIZABETH CITY STATE UNIVERSITY JULY 2006 OFFICE OF THE STATE AUDITOR LESLIE MERRITT, JR., CPA, CFP STATE AUDITOR AUDIT OF THE
More informationAdvanced Accounting Software & Secure Internet Solutions. Advanced Security Administrator Reference Manual
Advanced Accounting Software & Secure Internet Solutions Advanced Security Administrator Reference Manual Version 7.3 Information in this document is subject to change without notice and does not represent
More informationlean information technology service management: bottom-up process improvement that addresses the bottom line
lean information technology service management: bottom-up process improvement that addresses the bottom line BY jack white and scott chaiken 22 Contract Management May 2008 By implementing this approach,
More informationIMS Roles Maintenance User Guide
IMS Roles Maintenance User Guide Financial & Membership Services Membership Management Services Version 082011 Last Updated: 8/9/2011 Page 1 of 61 Table of Contents Overview... 3 Role Assignments... 5
More informationGROUPON.COM - PRIVACY POLICY
PRIVACY STATEMENT Last Updated: September 13, 2012 This Privacy Statement ( Privacy Statement ) explains how Groupon, Inc. ( Groupon, us, our, and we ) uses your information and applies to all who use
More informationEPAF Frequently Asked Questions
What is an EPAF? What is the flow of an EPAF? EPAF stands for Electronic Personnel Action Form. An EPAF allows personnel actions to be created and approved electronically, eliminating paper and allowing
More informationHow to Get Registered in
How to Get Registered in www.sam.gov Basics To receive a grant from ONR Global, whether it be a Collaborative Science Program (CSP) grant or a Naval International Cooperative Opportunities in Science and
More informationManaging Groups Using InFellowship. A guide for Small Group Leaders
Managing Groups Using InFellowship A guide for Small Group Leaders 2 3 Managing Groups Using InFellowship Table of Contents MyLifePoint your InFellowship account...4 InFellowship Groups - Your Dashboard...5
More informationCIC Library Automation Directors Security/Authentication Issues in the CIC Virtual Electronic Library March 29, 1996
CIC Library Automation Directors Security/Authentication Issues in the CIC Virtual Electronic Library March 29, 1996 This document outlines the major network security and authentication issues related
More informationMACHINE INDEPENDENCE IN COMPILING*
MACHINE INDEPENDENCE IN COMPILING* Harry D. Huskey University of California Berkeley, California, USA Since 1958, there has been a substantial interest in the development of problem-oriented languages
More informationThis Policy applies to all staff and other authorised users in St Therese School.
St. Therese School Computer and Internet Policy STAFF Policy Statement All staff and other authorised users of St Therese information and communications technology are to use the technology only in a way
More informationSpecial Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation)
Special Action Plan on Countermeasures to Cyber-terrorism of Critical Infrastructure (Provisional Translation) December 15, 2000 1. Goals of the Special Action Plan The goal of this action plan is to protect
More informationDheeraj Sanghi. Abstract. In the last few years, there have been a revolution in the telecommunication scenario of
NUMBERING PLAN FOR INTERNET TELEPHONY Dheeraj Sanghi Abstract In the last few years, there have been a revolution in the telecommunication scenario of the country. There are new services like paging, cellular,
More informationWeb Content Management
Web Content Management With Drupal School Website User Guide Version 1.1 1 Table of Contents Overview 3 Getting Started 4 Writing for the Web 5 Introducing: Your New Website 7 Logging in 7 The Landing
More informationDevelopment and Implementation of an Online Database for Bibliographic Control of Governments Documents in a Selective Depository
Providence College DigitalCommons@Providence Library Faculty and Staff papers Phillips Memorial Library 1989 Development and Implementation of an Online Database for Bibliographic Control of Governments
More informationNAVIGATING ZOOMGRANTS AND SETTING UP NEW ZOOMGRANTS ACCOUNTS
2016 NAVIGATING ZOOMGRANTS AND SETTING UP NEW ZOOMGRANTS ACCOUNTS APPLICANT INSTRUCTIONS REVISED: 01/04/2018 These instructions are intended for new Funding Opportunities released by the Division of Criminal
More informationLUMINATE ONLINE: FUNDAMENTALS-MANAGING CONSTITUENTS
Constituent360 is an online database that houses constituent profiles and is the center of all things Luminate Online. Learn how each interaction a constituent has with your organization from registrations,
More informationProfessional Engineers Ontario. canada s anti-spam. Guidelines for Chapters
Professional Engineers Ontario canada s anti-spam legislation (CASL) Guidelines for Chapters Published by Association of Professional Engineers of Ontario, February 2015 Contents 1. Introduction... 3 2.
More informationPRIVACY 102 TRAINING FOR SUPERVISORS. PRIVACY ACT OF U.S.C.552a
PRIVACY 102 TRAINING FOR SUPERVISORS PRIVACY ACT OF 1974 5 U.S.C.552a PRIVACY TOOL BOX WEB SITE: WWW.PRIVACY.NAVY.MIL Lists all approved Navy and Marine Corps Privacy Act systems of records DOD systems
More informationDepartment of the Army Acquisition Career Field Certification Policy and Procedures October 4, 2004
Department of the Army Acquisition Career Field Certification Policy and Procedures October 4, 2004 1. REFERENCES: (a) Title 10, United States Code, Chapter 87, Defense Acquisition Workforce, Section 1701-1764,
More information5.0 INTRODUCTION 5.1 OBJECTIVES 5.2 BASIC OPERATIONS
Lab Course UNIT 5 E-MAIL Stucture Page No. 5.0 Introduction 152 5.1 Objectives 152 5.2 Basic Operations 152 5.3 Managing Contacts 156 5.4 Lab Exercises 162 5.5 Summary 163 5.6 Further Reading 163 5.0 INTRODUCTION
More informationProduct Documentation SAP Business ByDesign February Marketing
Product Documentation PUBLIC Marketing Table Of Contents 1 Marketing.... 5 2... 6 3 Business Background... 8 3.1 Target Groups and Campaign Management... 8 3.2 Lead Processing... 13 3.3 Opportunity Processing...
More informationSession 2. Getting started with a well-structured system specification
Session 2 Getting started with a well-structured system specification COMP 320/420 Spring, 2018 Conrad Weisert The situation A representative approaches us. (or vice versa) He or she may be a. an executive
More informationSecurity Cooperation Information Portal
U.S. Government (USG)/SCO Token Access Guide June 2017 https://www.scportal.us/ Contents USG/SCO Employee Token Access... 3 General Information... 3 Electronic Token... 3 Tokencode... 3 Permissions...
More informationAdmin Plus Pack Option. ExecView Web Console. Backup Exec Admin Console
WHITE PAPER Managing Distributed Backup Servers VERITAS Backup Exec TM 9.0 for Windows Servers Admin Plus Pack Option ExecView Web Console Backup Exec Admin Console VERSION INCLUDES TABLE OF CONTENTS STYLES
More informationHow does your organization manage Privileged Users?
How does your organization manage Privileged Users? A GOVERNMENT & MILITARY SOLUTION GUIDE IONsales@apitech.com www.apitech.com Tel: +1 908-546-3900 Who is ION Networks? ION Networks The most trusted name
More informationIt is a Joomla! component add on to the Community Builder (CB) system intended to allow flexible ing to defined user lists.
CbMailing User Guide CbMailing version to which this document relates: 2.1 What is it? It is a Joomla! component add on to the Community Builder (CB) system intended to allow flexible e-mailing to defined
More informationPUSHING INFORMATION TO USERS
PUSHING INFORMATION TO USERS Table of Contents Sharing Elements... 3 The Share function... 4 Sharing elements with users not registered in Metric Insights...11 Understanding Folders (new in Release 5.2)...14
More informationZoom User Manual. developed. Gary P. Davis. and. David J. Ayersman. for. Students and Employees of New River Community and Technical College
Zoom User Manual developed by Gary P. Davis and David J. Ayersman for Students and Employees of Zoom manual.docx Page 1 of 35 Last Updated: August 13, 2018 PREFACE AND OVERVIEW For the fall 2018 term,
More informationTxDOT Internal Audit Materials and Testing Audit Department-wide Report
Materials and Testing Audit Department-wide Report Introduction This report has been prepared for the Transportation Commission, TxDOT Administration and management. The report presents the results of
More informationProtecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors
Protecting Personally Identifiable Information (PII) Privacy Act Training for Housing Counselors Presented by the Office of Housing Counseling and The Office of the Chief Information Officer Privacy Program
More informationSCHEME OF DELEGATION (Based on the model produced to the National Governors Association)
SCHEME OF DELEGATION (Based on the model produced to the National Association) THE PURPOSE OF A SCHEME OF DELEGATION: A scheme of delegation (SoD) is the key document defining which functions have been
More informationInstructions for Gaining Access to PMRT
31 October 2017 General Information: Instructions for Gaining Access to PMRT Project Management Resource Tools (PMRT) is accessed via https://pmrt.altess.army.mil/pmrt/. A Common Access Card (CAC) is required
More informationProject Summary. June 15, Local Government School District Collaboration. VoIP Telephone System (Voice over Internet Protocol)
June 15, 2005 Project Summary Local Government School District Collaboration VoIP Telephone System (Voice over Internet Protocol) Through the support and vision of City Council and the Trustees of School
More informationEDENRED COMMUTER BENEFITS SOLUTIONS, LLC PRIVACY POLICY. Updated: April 2017
This Privacy Policy (this Privacy Policy ) applies to Edenred Commuter Benefits Solutions, LLC, (the Company ) online interface (i.e., website or mobile application) and any Edenred Commuter Benefit Solutions,
More informationCorporate Online. Using Accounts
Corporate Online. Using Accounts About this Guide About Corporate Online Westpac Corporate Online is an internet-based electronic platform, providing a single point of entry to a suite of online transactional
More informationWIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES
Intermediate School District #917 WIRELESS DEVICES: ACCEPTABLE USE AND GUIDELINES Procedures Manual April 2009 Table of Contents Overview 3 Definitions 3 General Guidelines 4 Eligibility Requirements 5
More informationFreecoms VoIP Mobile Community Telecom S. Ferrari, page n 1»
Freecoms VoIP Mobile Community Telecom S. Ferrari, page n 1» Multiservice Mobile VoIP Community Powerful multiservice package: Home and Mobile VoIP communication. Business and Private WEB Portal community
More informationAutomatic Purge Implementation Susan L. Straub Alliance Data Dallas, Texas
Automatic E-mail Purge Implementation Susan L. Straub Alliance Data Dallas, Texas NEED/OPPORTUNITY / Alliance Data was implementing a new automatic e-mail purge policy that would affect every associate
More informationGiftGuide/GiftStory/GiftCalcs User Reference Manual
GiftGuide/GiftStory/GiftCalcs User Reference Manual Copyright (c) 2011 PG Calc Incorporated All rights reserved. Unauthorized use or duplication is prohibited. revised 6/16/2011 Table of Contents Getting
More informationTAMS E-IT. Approvers Manual. How to approve, reject or reassign for further approvals. Approvers Manual 2-1
TAMS E-IT Approvers Manual How to approve, reject or reassign for further approvals Approvers Manual 2-1 TAMS E-IT Approvers General Information: Approvers will be alerted of an EIT awaiting their action
More informationStatement of Chief Richard Beary President of the International Association of Chiefs of Police
Statement of Chief Richard Beary President of the International Association of Chiefs of Police Subcommittee on Counterterrorism and Intelligence Committee on Homeland Security United States of House of
More informationNAVY FLIGHT TEST AND THE REAL- TIME TELEMETRY PROCESSING SYSTEM
NAVY FLIGHT TEST AND THE REAL- TIME TELEMETRY PROCESSING SYSTEM Item Type text; Proceedings Authors Hummel, William R. Publisher International Foundation for Telemetering Journal International Telemetering
More informationMICHIGAN INTERNATIONAL SPEEDWAY KIDS CLUB PRIVACY POLICY
MICHIGAN INTERNATIONAL SPEEDWAY KIDS CLUB Last Modified: October 12, 2012 PRIVACY POLICY Welcome to the Michigan International Speedway Kid s Club website (the Site ). The Site is owned and operated by
More informationResponse to Santa Barbara County Grand Jury Reports (1) Santa Barbara County Emergency Operations Center (2) Emergency Public Information
County of Santa Barbara FIRE DEPARTMENT / OFFICE OF EMERGENCY SERVICES 4410 CATHEDRAL OAKS ROAD SANTA BARBARA, CALIFORNIA 93110-1042 TEL 805.681.5526 FAX 805.681.5553 John M. Scherrei Fire Chief Bruce
More informationEllie Bushhousen, Health Science Center Libraries, University of Florida, Gainesville, Florida
Cloud Computing Ellie Bushhousen, Health Science Center Libraries, University of Florida, Gainesville, Florida In the virtual services era the term cloud computing has worked its way into the lexicon.
More informationDownload, Install and Use Winzip
Download, Install and Use Winzip Something that you are frequently asked to do (particularly if you are in one of my classes) is to either 'zip' or 'unzip' a file or folders. Invariably, when I ask people
More informationUsers and roles. Contents
Users and roles Help bits Contents Overview... 3 Users... 4 Operation... 5 Users tab... 6 Creating a new user... 9 Role tab... 10 Editing a role... 11 Creating a new role... 11 Role deletion... 12 Privacy
More informationBPA Worldwide Guide to Outbound Telemarketing Recording
BPA Worldwide Guide to Outbound Telemarketing Recording Operating Guidelines for Publishing Companies and Telemarketing Agencies Involved in the Acquisition and Requalification of Telecommunication Requests
More information2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION
2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION 2016 Survey MANAGING APPLE DEVICES IN HIGHER EDUCATION The annual Jamf Trends Survey looked at Apple in higher education evaluating growth, key drivers
More informationHOW TO ENROLL...3 To Enroll in NBT Online Banker and Bill Pay... 3 Existing NBT Online Banker and NBT Online Banker for Business Users...
TABLE OF CONTENTS HOW TO ENROLL...3 To Enroll in NBT Online Banker and Bill Pay... 3 Existing NBT Online Banker and NBT Online Banker for Business Users... 4 NAVIGATING YOUR PAYMENT CENTER...5 Payments
More informationTHINGS YOU NEED TO KNOW ABOUT USER DOCUMENTATION DOCUMENTATION BEST PRACTICES
5 THINGS YOU NEED TO KNOW ABOUT USER DOCUMENTATION DOCUMENTATION BEST PRACTICES THIS E-BOOK IS DIVIDED INTO 5 PARTS: 1. WHY YOU NEED TO KNOW YOUR READER 2. A USER MANUAL OR A USER GUIDE WHAT S THE DIFFERENCE?
More informationUNCLASSIFIED R-1 ITEM NOMENCLATURE FY 2013 OCO
Exhibit R-2, RDT&E Budget Item Justification: PB 2013 Defense Information Systems Agency DATE: February 2012 COST ($ in Millions) FY 2011 FY 2012 Base PE 0305208K: Distributed Common Ground/Surface Systems
More informationAdobe Digital Media (Formerly Desktop) Products Enterprise Software Agreement Carahsoft Technology. Blanket Purchase Agreement (BPA) N A-ZF31
Adobe Digital Media (Formerly Desktop) Products Enterprise Software Agreement Carahsoft Technology Blanket Purchase Agreement (BPA) N00104-12-A-ZF31 (Approved 4/21/14) 1 DOD ESI BPA ORDERING GUIDE This
More informationEast End Cooperative Ministry-Development Office Daniel Tilkin, Student Consultant Petrie Holmes, Community Partner
East End Cooperative Ministry-Development Office Daniel Tilkin, Student Consultant Petrie Holmes, Community Partner Introduction East End Cooperative Ministry (EECM) is a nonprofit interfaith coalition
More informationPrivacy Policy. Effective date: 21 May 2018
Privacy Policy Effective date: 21 May 2018 We at Meetingbird know you care about how your personal information is used and shared, and we take your privacy seriously. Please read the following to learn
More informationOracle Banking Digital Experience
Oracle Banking Digital Experience Checking Account Originations User Manual Release 18.2.0.0.0 Part No. E97823-01 June 2018 Checkings Account Originations User Manual June 2018 Oracle Financial Services
More informationDepartment of the Navy Data Server and Data Center Waiver Scope Matrix and FAQ
How to use this document in determining Data Server and Data Center Scope: The predominant factor in determining whether a proposed obligation falls under the Data Server and Data Center Waiver requirement
More informationContinued =5.28
Chapter Nine Graphing and Introduction to Statistics Learning Objectives: Ch 9 What is mean, medians, and mode? Tables, pictographs, and bar charts Line graphs and predications Creating bar graphs and
More informationBeecher Community School District
Beecher Community School District District & Building Communications Protocol What is the system? What is the purpose of Communications System? This system provides clear internal and external communication
More informationB. We may offer you the opportunity to submit other information about yourself (such as gender, age, occupation, hobbies, interests, zip code, etc.
DELANCEYPLACE.COM LLC PRIVACY POLICY DELANCEYPLACE.COM, LLC and its affiliates ( DelanceyPlace, we or us ) operate a website and related social network along with all related applications, software, daily
More informationCOS Pivot Profile Overview
COS Pivot Profile Overview COS Pivot contains the largest available collection of searchable profiles of full-time faculty. It provides authoritative information about more than 3 million scholars around
More informationPOC User Guide. Financial Disclosure Management
POC User Guide Financial Disclosure Management Financial Disclosure Management 8.2.0.17 Publication 1.0 November 2018 Table of Contents Your Role as a Point of Contact (POC)...4 Organize Filers Prior to
More informationECA Trusted Agent Handbook
Revision 8.0 September 4, 2015 Introduction This Trusted Agent Handbook provides instructions for individuals authorized to perform personal presence identity verification of subscribers enrolling for
More informationThe Hidden Costs of Free Database Auditing Comparing the total cost of ownership of native database auditing vs. Imperva SecureSphere
Comparing the total cost of ownership of native database auditing vs. Imperva SecureSphere Executive Summary To achieve compliance for regulatory mandates, many organizations turn to the free auditing
More informationCanadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS
Canadian Anti-Spam Legislation (CASL) FREQUENTLY ASKED QUESTIONS IMPORTANT: This FAQ is intended to assist UofL staff and faculty members to understand their obligations under CASL. It is an overview of
More informationSQL Server Database Provisioning Report. Survey on database provisioning requirements among SQL Server Professionals
SQL Server Database Provisioning Report Survey on database provisioning requirements among SQL Server Professionals Foreword Waiting until the point of release to see how our software behaves is a key
More information